Essay, Research Paper: Encryption

Computers

Free Computers research papers were donated by our members/visitors and are presented free of charge for informational use only. The essay or term paper you are seeing on this page was not produced by our company and should not be considered a sample of our research/writing service. We are neither affiliated with the author of this essay nor responsible for its content. If you need high quality, fresh and competent research / writing done on the subject of Computers, use the professional writing service offered by our company.

The electronic age has brought forth many technological advances. With these
advances came the need for security and tighter control on how we send
information electronically over the Internet or through a network. Date
encryption is, in its simplest terms, the translation of data into a secret
code. In order to read an encrypted file, the receiver of the file must obtain a
secret key that will enable him to decrypt the file. A deeper look into
cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide
a better understanding of date encryption. Cryptographic Methods There are two
standard methods of cryptography, asymmetric encryption and symmetric
encryption. Data that is in its original form (unscrambled) is called plaintext.
Once the data is scrambled and in its encrypted form it is called ciphertext.
The ciphertext, which should be unintelligible to anyone not holding the
encryption key, is what is stored in the database or transmitted down the
communication line. Asymmetric encryption (also know as public key encryption)
uses two separate keys, a public key and a private key. The private key is
available only to the individual receiving the encrypted message. The public key
is available to anyone who wishes to send data or communicate to the holder of
the private key. Asymmetric encryption is considered very safe but is
susceptible to private key theft or breaking of the private key (this is
virtually impossible and would constitute trying billions of possible key
combinations) (4). Types of public key algorithms include Riverst-Shamir-Adelman
(RSA), Diffie-Hellman, Digital Signature Standard (DSS), EIGamal, and LUC (5).
Symmetric encryption uses only one key (a secret key) to encrypt and decrypt the
message. No public exchange of the key is required. This method is vulnerable if
the key is stolen or if the ciphertext is broken (4). Types of symmetric
algorithms include DES, Blowfish, International Data Encryption Algorithm
(IDEA), RC4, SAFER, and Enigma (5). Cryptanalysis Cryptanalysis is the art of
breaking cryptography. Methods of cryptanalysis include: „h Ciphertext-only
attack ¡V the attacker works from ciphertext only. The attacker does not know
anything about the message and is merely guessing about the plaintext (6). „h
Know-plaintext attack ¡V the attacker know the plaintext. Knowing this
information, the attacker can attempt to decrypt the ciphertext (6). „h Chosen
plaintext attack ¡V the attacker can have a message encrypted with the unknown
key. The attacker must then determine the key used for encryption (6). „h
Man-in-the-middle attack ¡V the attacker intercepts the key that is being
exchanged between parties (6). Data Encryption Standard (DES) In 1977 the
National Institute of Standards and Technology (NIST) and IBM developed the Data
Encryption Standard, or DES, to provide a means by which data could be
scrambled, sent electronically to a destination, and then unscrambled by the
receiver. DES was developed to protect data in the federal computer systems
against passive and active attacks (3). Every five years the NIST reviews the
DES and determines whether the cryptographic algorithm should be revised, is
acceptable, or completely withdrawn. DES uses a very complex algorithm, or key,
that has been deemed unbreakable by the U.S. government. There are
72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that
can be used. It applies a 56-bit key to each 64-bit block of data. This process
involves 16 rounds of operations that mix the data and key together using
operations of permutation and substitution. The end result is a completely
scrambled data and key so that every bit of the ciphertext depends on every bit
of the data plus every bit of the key (a 56-bit quantity for DES) (2).
Conclusion Sending secure electronic information is vital for businesses today.
Although the electronic age has made it easier for companies to send and receive
information, it has also increased the need for security. Data encryption in
itself will not assure any business of sending secure information, but
understanding it will surely benefit the company. Businesses who understand
cryptography, cryptanalysis, and Data Encryption Standard are on their way to
understanding data encryption.
Bibliography
1. Bay Networks, Inc. (1997). Configuring Software Encryption. www.baynetworks.com

2. Biasci, L. (1999). Cryptology. www.whatis.com.

3. Frazier, R.E., (1999). Data Encryption Techniques. www.softstrategies.com.
4. Litterio, F., (1999). Cryptology: The Study of Encryption. www.world.std.com.

5. SSH Communications Security, (1999). Cryptographic Algorithms. www.ipsec.com.

6. SSH Communications Security, (1999). Introduction to Cryptography.
www.ipsec.com.

0
0
Good or bad? How would you rate this essay?
Help other users to find the good and worthy free term papers and trash the bad ones.
Like this term paper? Vote & Promote so that others can find it

Get a Custom Paper on Computers:

Free papers will not meet the guidelines of your specific project. If you need a custom essay on Computers: , we can write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written papers will pass any plagiarism test, guaranteed. Our writing service will save you time and grade.




Related essays:

0
0
Dividing a web page into frames is quite simple. Frames organize web pages by dividing them into rows or columns. The basic concept of frames is that each frame is a regular, complete html document. T...
4032 views
0 comments
0
0
Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorship. Introduction I. In the Internet commu...
4188 views
0 comments
0
0
Computers / Hacker's Hell 
To deal with hackers who break through office systems through the Internet it is important for information managers to understand their enemy well. If they have sound background knowledge about hacker...
3645 views
0 comments
0
2
Computers / Hackers
Since the introduction of personal computers in the 1970's, the art of computer hacking has grown along with changing roles of computers in society. Computers have taken over our lives. People could n...
5298 views
0 comments
0
0
Computers / Hackers
The meaning of a hacker is one who accesses a computer that can supposably not be accessed to non authorized people of the community. Hackers may use any type of system to access this information depe...
3738 views
0 comments